EAP. See Extensible Authentication Protocol
eavesdropping, 57. See also man-in-the-middle attacks
wireless networks and, 472-474
ECC. See Elliptical Curve Cryptography
edit.exe, 216
edlin.exe, 216
Effective Permissions tab, 172
EFI (Extended Firmware Interface), 9, 10, 74
Boot Manager, 74, 75
firmware, 74, 75
64-bit platform and, 74
EFS. See Encryption File System
802.11 Legacy wireless security recommendations, 477-480
changing AP's default Administrator Password, 480
changing AP's default SSID, 478
disabling DHCP on AP, 478-479
disabling SSID broadcasting, 479-480
enabling MAC filtering, 478
requiring user authentication passwords, 479
802.11 Wi-Fi standards, 463-464
802.11 wireless networks, 461. See also wireless networks
elevate tool, 166
elevated processes, 134
elevate.exe application, 166, 167
elevation, 130-140
auditing, 162-164
command prompt, 166-167
installers and, 166
non-admin, 137-139
prompts, 133
scripts and, 166
special topics, 139-140
of standard users, 150-151, 168
of unsigned executables, 151
Windows Explorer and attempted, 154-156
Elliptical Curve Cryptography (ECC), 26
e-mail. See also Windows Mail
defenses, 390-398
anti-malware software, 398
disable automatic download of HTML content, 394-395
file attachment blocking, 395-398
HTML content in Restricted zone, 393-394
plain-text conversion, 391-393, 535
plain-text passwords disabled, 398
protection, 351-399
best practices, 399
as spam, 226
threats, 351-384
buffer overflow, 384
embedded content, 381-382
embedded links, 382
file attachments, 58, 351-381
leaked passwords, 383
miscellaneous, 383-384
embedded content, 381-382. See also malicious file attachments
embedded links, 382
empty DACLs. See discretionary access control lists
Enable .NET Framework setup (setting), 270, 279
encryption
digital certificates and, 257-258
enhancements/support, 26-27, 257-258
hard disk, 534-535
Encryption File System (EFS), 27, 77. See also BitLocker Drive Encryption
enhancements, 27
escalation, of privileges, 54-55
Ettercap, 57
event forwarding, 29, 30
Event Log interface, 29, 30
Event Log Readers, 24
event logs, 28
Group Policy and, 497-498
improvements, 28-29
as securable objects, 173
subscriptions, 30
event numbers, 162
new, 162
event triggers, 29
events, as securable processes, 173
exploitation techniques, malicious, 43-60
Extended Firmware Interface. See EFI
Extensible Application Markup Language. See XAML
Extensible Authentication Protocol (EAP), 468
versions, 468